Risk Management Lecture 4 Flashcards

1
Q

What are the key processes to Access Control?

A

Identification

Authentication

Authorization

Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In relation to access control, what is identification?

A

Identification can be boiled down to “Who are you?”

Like a username/drivers license id.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In relation to access control, what is Authentication?

A

Authentication is the process of verifying if you truly are who you identify as.

For example, this could be a password along with your username.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In relation to access control authentication, what are the 3 general factors that can be used?

A

a) something you know,
e. g., a security question only you have the answer, a password created by yourself, etc.

b) something you have,
e. g., a smartcard such as ATM banking card, a key your room, etc.

c) something you are,
e. g., your fingerprint, your face, your voice, etc. It is also known as “biometrics”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In relation to access control, what is Authorization?

A

This is a process of mapping what an individual has access to after identification and authorization.

For instance if you were an HR employee, having access to HR’s printer is normal, but access to the backend database for production wouldn’t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In relation to access control, what is two-factor authentication?

A

“Two-factor authentication” means that two different methods mentioned above are used in combination for authentication.
A typical example would be a VPN application which requires both user ID/password and a physical token showing one-time passwords.
If a business manager tells you that his/her application needs to have strong authentication, you can interpret it as two-factor authentication required at a minimum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In relation to access control, what is Accountability?

A

Another important security feature for identity & access management is to maintain audit logs and make sure non-repudiation can be established.
For example, during a incident investigation, you may need to prove that a person logged into a particular application and performed a specific action (e.g., deleted an important file) at a certain point in time.
If non-repudiation has been well established, then the identified person would not be able to deny that action!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In biometric systems, what kinds of physical attributes can we use for authorization?

A

a) palm scan – captures fingerprints of each finger
b) hand geometry – captures the shape of a person’s hand (e.g., shape, length, width of hand and fingers)
c) retina scan – captures the patter of the retina on the backside of the eyeball
d) iris scan – captures the colored portion of the eye that surrounds the pupil (most accurate biometric method as of today)!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In biometric systems, what kinds of behavioural characteristics can we use for authorization?

A

Handwriting
Signatures
Patterns of typing on a keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In biometric systems, what is a Type I Error?

A

A system that rejects an authorized user.

Also known as a “false rejection rate(FRR)”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In biometric systems, what is a Type II Error?

A

A system that accepts unauthorized users that should have been rejected.

Also Called a “False acceptance Rate(FAR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In biometric systems, what is Crossover Error Rate (CER)?

A

Rating that measures the percentage of Type I Errors = Type II Errors

Smaller CER value means a more accurate system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is IAM?

A

Identity and Access Management

Basically the means to assign a user with what they have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Single sign-on(SSO)?

A

SSO is a way of verifying identity once, and having that accessible across numerous applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Role-based IAM?

A

Role-based IAM is a means of simplifying IAM to make it easier to give/take access away from users or groups of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Kerberos?

A

Kerberos is a authentication protocol developed to provide SSO functionality to distributed environments.

It uses symmetric key cryptography eliminating the need to store passwords locally.

17
Q

What are the key steps in Kerberos authentication?

A
  1. User authenticates to Authentication
    Service
  2. AS issues initial ticket (TGT, Ticket Granting
    Ticket) to user
  3. User sends a request to TGS asking for
    access to printer
  4. TGS issues a new ticket (service ticket) with
    session keys
  5. User extracts one session key and sends
    the service ticket to file printer
18
Q

What is SAML( Security Assertion Markup Language) ?

A

Widely used protocol used to establish identity federation over the internet

19
Q

How does SAML work?

A
  1. User accesses some service
  2. Service contacts Identity provider
  3. Identity provider asks User to login
  4. SAML Token is generated and sent to Service
  5. Service confirms users login.
20
Q

What are the layers involved in protecting data?

A
  1. Application layer – “who is able to access what”
    - user authentication,
    - role-based access management, etc.
  2. Network layer –“which device is able to connect”
    - Firewalls,
    - NAC (Network access control),
    - VLAN network segmentation,
    - Network zoning, etc.
  3. Host layer
    - Malware protection
    - Monitoring of file integrity
    - Configuration management
  4. Database layer - “identify abnormal behaviors for database usage”
    - Role-based database access management
    - Databased monitoring, e.g., behavioral-based system to identity abnormal events
21
Q

What are the 2 ways you can detect security events/incidents?

A
  1. Signature Based

2. Behavioural Based

22
Q

In relation to detecting security events, what is a signature based detection method?
And what is it good at?

A

You maintain a database of signatures for known issues.
eg. signature database for computer virus’

Good for capturing known issues, but possibly lets new threats through.

23
Q

In relation to detecting security events, what is a behavoural based detection method?

A

You create a baseline with normal patterns, then identify outliers.

For example an employee routinely logs in everyday at 9am and leaves at 5pm, someone logging in outside those hours is suspicious.

24
Q

What are 2 possible detection failures?

A
  1. False Positive

2. False Negative

25
Q

In relation to detection failures, what is a false positive?

A

Something normal identified as a bad event.

26
Q

In relation to detection failures, what is a false negative?

A

Something malicious marked as good/normal.

eg. installing a malicous piece of software

27
Q

What, typically becomes an organizations weakest link in relation to security?

A

In many cases, end users, particular the ones lacking security awareness and training, become
the organization’s weakest link
- end users behaviors are usually very unpredictable
- very vulnerable to “social engineering” types of attacks
- users always prefer “usability” & “functionality” over “security”